Description
An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/hudson/plugins/active_directory/ActiveDirectoryUnixAuthenticationProvider.java that allows attackers to impersonate the Active Directory server Jenkins connects to for authentication if Jenkins is configured to use StartTLS.
Remediation
References
https://jenkins.io/security/advisory/2019-01-28/#SECURITY-859
Related Vulnerabilities
CVE-2021-21611 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2022-43401 Vulnerability in maven package org.jenkins-ci.plugins:script-security
CVE-2015-3250 Vulnerability in maven package org.apache.directory.api:apache-ldap-api
CVE-2014-0035 Vulnerability in maven package org.apache.cxf:cxf-bundle-minimal
CVE-2020-25633 Vulnerability in maven package org.jboss.resteasy:resteasy-client-api